Hemang Monga, Jatin Bhutani, Muskan Ahuja, Nikita Maid, H. Pande
Indian Sign Language is one of the most important and widely used forms of communication for people with speaking and hearing impairments. Many people or communities have attempted to create systems that read the sign language symbols and convert the same to text, but text or audio to sign language is still infrequent. This project mainly focuses on developing a translating system consisting of many modules that take English audio and convert the input to English text, which is further parsed to structure grammar representation on which grammar rules of Indian Sign Language are applied. Stop words are removed from the reordered sentence. Since the Indian Sign Language does not support conjugation in words, stemming and lemmatization will transform the provided word into its root or original word. Then all the individual words are checked in a dictionary holding videos of each word. If the system does not find words in the dictionary, then the most suitable synonym replaces them. The system proposed by us is inventive as the current systems are bound to direct conversion of words into Indian Sign Language on-the-other-hand our system aims to convert the sentences in Indian Sign Language grammar and effectively display it to the user.
{"title":"Speech to Indian Sign Language Translator","authors":"Hemang Monga, Jatin Bhutani, Muskan Ahuja, Nikita Maid, H. Pande","doi":"10.3233/apc210172","DOIUrl":"https://doi.org/10.3233/apc210172","url":null,"abstract":"Indian Sign Language is one of the most important and widely used forms of communication for people with speaking and hearing impairments. Many people or communities have attempted to create systems that read the sign language symbols and convert the same to text, but text or audio to sign language is still infrequent. This project mainly focuses on developing a translating system consisting of many modules that take English audio and convert the input to English text, which is further parsed to structure grammar representation on which grammar rules of Indian Sign Language are applied. Stop words are removed from the reordered sentence. Since the Indian Sign Language does not support conjugation in words, stemming and lemmatization will transform the provided word into its root or original word. Then all the individual words are checked in a dictionary holding videos of each word. If the system does not find words in the dictionary, then the most suitable synonym replaces them. The system proposed by us is inventive as the current systems are bound to direct conversion of words into Indian Sign Language on-the-other-hand our system aims to convert the sentences in Indian Sign Language grammar and effectively display it to the user.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123022108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Annapoorani, J. Banupriya, P. Navaraja, V. Chinnammal
Abstract of our paper’s major intent is to manage power and to share the solar load power to grid system by using smart grid technologies that is called as Demand Side Management (DSM). This paper gives the idea of modernized delivery system of electricity in which it observes, safeguards and adjusts accordingly with the energy that is used in home. The objective of the work is when the renewable resources are plentiful and electricity becomes affordable, time-of-use pricing, which allows customers to move some of their energy use to consistent and convenient moment of the day.
{"title":"A New Tariff Based Energy Saving and Sharing Scheme from Renewable Energy Using Smart Grid","authors":"V. Annapoorani, J. Banupriya, P. Navaraja, V. Chinnammal","doi":"10.3233/apc210270","DOIUrl":"https://doi.org/10.3233/apc210270","url":null,"abstract":"Abstract of our paper’s major intent is to manage power and to share the solar load power to grid system by using smart grid technologies that is called as Demand Side Management (DSM). This paper gives the idea of modernized delivery system of electricity in which it observes, safeguards and adjusts accordingly with the energy that is used in home. The objective of the work is when the renewable resources are plentiful and electricity becomes affordable, time-of-use pricing, which allows customers to move some of their energy use to consistent and convenient moment of the day.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125131711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sudhakar, A. Akashwar, M. Ajay Someshwar, T. Dhaneshguru, M. Prem Kumar
The growing network traffic rate in wireless communication demands extended network capacity. Current crypto core methodologies are already reaching the maximum achievable network capacity limits. The combination of AES with other crypto cores and inventing new optimization models have emerged. In this paper, some of the prominent issues related to the existing AES core system, namely, lack of data rate, design complexity, reliability, and discriminative properties. In addition to that, this work also proposes a biometric key generation for AES core that constitutes simpler arithmetic such as substitution, modulo operation, and cyclic shifting for diffusion and confusion metrics which explore cipher transformation level. It is proved that in AES as compared to all other functions S-Box component directly influences the overall system performance both in terms of power consumption overhead, security measures, and path delay, etc.
{"title":"Improving Security Using Modified S-Box for AES Cryptographic Primitives","authors":"S. Sudhakar, A. Akashwar, M. Ajay Someshwar, T. Dhaneshguru, M. Prem Kumar","doi":"10.3233/apc210288","DOIUrl":"https://doi.org/10.3233/apc210288","url":null,"abstract":"The growing network traffic rate in wireless communication demands extended network capacity. Current crypto core methodologies are already reaching the maximum achievable network capacity limits. The combination of AES with other crypto cores and inventing new optimization models have emerged. In this paper, some of the prominent issues related to the existing AES core system, namely, lack of data rate, design complexity, reliability, and discriminative properties. In addition to that, this work also proposes a biometric key generation for AES core that constitutes simpler arithmetic such as substitution, modulo operation, and cyclic shifting for diffusion and confusion metrics which explore cipher transformation level. It is proved that in AES as compared to all other functions S-Box component directly influences the overall system performance both in terms of power consumption overhead, security measures, and path delay, etc.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130551409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Pawar, M. A. Jawale, Ravi Kumar Tirandasu, S. Potharaju
High dimensionality is the serious issue in the preprocessing of data mining. Having large number of features in the dataset leads to several complications for classifying an unknown instance. In a initial dataspace there may be redundant and irrelevant features present, which leads to high memory consumption, and confuse the learning model created with those properties of features. Always it is advisable to select the best features and generate the classification model for better accuracy. In this research, we proposed a novel feature selection approach and Symmetrical uncertainty and Correlation Coefficient (SU-CCE) for reducing the high dimensional feature space and increasing the classification accuracy. The experiment is performed on colon cancer microarray dataset which has 2000 features. The proposed method derived 38 best features from it. To measure the strength of proposed method, top 38 features extracted by 4 traditional filter-based methods are compared with various classifiers. After careful investigation of result, the proposed approach is competing with most of the traditional methods.
{"title":"SU-CCE: A Novel Feature Selection Approach for Reducing High Dimensionality","authors":"A. Pawar, M. A. Jawale, Ravi Kumar Tirandasu, S. Potharaju","doi":"10.3233/apc210196","DOIUrl":"https://doi.org/10.3233/apc210196","url":null,"abstract":"High dimensionality is the serious issue in the preprocessing of data mining. Having large number of features in the dataset leads to several complications for classifying an unknown instance. In a initial dataspace there may be redundant and irrelevant features present, which leads to high memory consumption, and confuse the learning model created with those properties of features. Always it is advisable to select the best features and generate the classification model for better accuracy. In this research, we proposed a novel feature selection approach and Symmetrical uncertainty and Correlation Coefficient (SU-CCE) for reducing the high dimensional feature space and increasing the classification accuracy. The experiment is performed on colon cancer microarray dataset which has 2000 features. The proposed method derived 38 best features from it. To measure the strength of proposed method, top 38 features extracted by 4 traditional filter-based methods are compared with various classifiers. After careful investigation of result, the proposed approach is competing with most of the traditional methods.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130551773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. S. Amiripalli, P. Likhitha, Sisankita Patnaik, Suresh Babu, Rampay. Venkatarao
Speech emotion detection has been extremely relevant in today’s digital culture in recent years. RAVDESS, TESS, and SAVEE Datasets were used to train the model in our project. To determine the precision of each algorithm with each dataset, we looked at ten separate Machine Learning Algorithms. Following that, we cleaned the datasets by using the mask feature to eliminate unnecessary background noise, and then we applied all 10 algorithms to this clean speech dataset to improve accuracy. Then we look at the accuracies of all ten algorithms and see which one is the greatest. Finally, by using the algorithm, we could calculate the number of sound files correlated with each of the emotions described in those datasets.
{"title":"A Study on Speech Emotion Recognitions on Machine Learning Algorithms","authors":"S. S. Amiripalli, P. Likhitha, Sisankita Patnaik, Suresh Babu, Rampay. Venkatarao","doi":"10.3233/apc210225","DOIUrl":"https://doi.org/10.3233/apc210225","url":null,"abstract":"Speech emotion detection has been extremely relevant in today’s digital culture in recent years. RAVDESS, TESS, and SAVEE Datasets were used to train the model in our project. To determine the precision of each algorithm with each dataset, we looked at ten separate Machine Learning Algorithms. Following that, we cleaned the datasets by using the mask feature to eliminate unnecessary background noise, and then we applied all 10 algorithms to this clean speech dataset to improve accuracy. Then we look at the accuracies of all ten algorithms and see which one is the greatest. Finally, by using the algorithm, we could calculate the number of sound files correlated with each of the emotions described in those datasets.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131299747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of online net banking official sites has been rapidly increased now a days. In online transaction attackers need only little information to steal the private information of bank users and can do any kind of fraudulent activities. One of the major drawbacks of commercial losses in online banking is fraud detected by credit card fraud detection system, which has a significant impact on clients. Fraudulent transactions will be discovered after the transaction is completed in the existing novel privacy models. As a result, in this paper, three level server systems are implemented to partition the intermediate gateway with better security. User details, transaction details and account details are considered as sensitive attributes and stored in separate database. And also data suppression scheme to replace the string and numerical characters into special symbols to overcome the traditional cryptography schemes is implemented. The Quasi-Identifiers are hidden by using Anonymization algorithm so that the transactions can be done efficiently.
{"title":"Enhanced Data Privacy Using Vertical Fragmentation and Data Anonymization Techniques","authors":"R. Sudha, G. Pooja, V. Revathy, S. D. Dilip Kumar","doi":"10.3233/apc210292","DOIUrl":"https://doi.org/10.3233/apc210292","url":null,"abstract":"The use of online net banking official sites has been rapidly increased now a days. In online transaction attackers need only little information to steal the private information of bank users and can do any kind of fraudulent activities. One of the major drawbacks of commercial losses in online banking is fraud detected by credit card fraud detection system, which has a significant impact on clients. Fraudulent transactions will be discovered after the transaction is completed in the existing novel privacy models. As a result, in this paper, three level server systems are implemented to partition the intermediate gateway with better security. User details, transaction details and account details are considered as sensitive attributes and stored in separate database. And also data suppression scheme to replace the string and numerical characters into special symbols to overcome the traditional cryptography schemes is implemented. The Quasi-Identifiers are hidden by using Anonymization algorithm so that the transactions can be done efficiently.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130704628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Machine learning enables AI and is used in data analytics to overcome many challenges. Machine learning was the growing method of predicting outcomes based on existing data. The computer learns characteristics from the test implementation, then applies characteristics to an unknown dataset to predict the result. Classification is an essential technique of machine learning which is widely used for forecasting. Some classification techniques predict with adequate accuracy, while others show a small precision. This research investigates a process called machine learning classification, which combines different classifiers to enhance the precision of weak architectures. Experimentation using this tool was conducted using a database on heart disease. The collecting and measuring data method were designed to decide how to use the ensemble methodology to improve predictive accuracy in cardiovascular disease. This paper aims not only to enhance the precision of poor different classifiers but also to apply the algorithm with a neural network to demonstrate its usefulness in predicting disease in its earliest stages. The study results show that various classification algorithmic strategies, such as support vector machines, successfully improve the forecasting ability of poor classifiers and show satisfactory success in recognizing heart attack risk. Using ML classification, a cumulative improvement in the accuracy was obtained for poor classification models. That process efficiency was further improved with the introduction of feature extraction and selection, and the findings show substantial improvements in predictive power.
{"title":"Prediction of Heart Disease Severity Measurment Using Deep Learning Techniques","authors":"R. S. Patil, Mohit Gangwar","doi":"10.3233/apc210245","DOIUrl":"https://doi.org/10.3233/apc210245","url":null,"abstract":"Machine learning enables AI and is used in data analytics to overcome many challenges. Machine learning was the growing method of predicting outcomes based on existing data. The computer learns characteristics from the test implementation, then applies characteristics to an unknown dataset to predict the result. Classification is an essential technique of machine learning which is widely used for forecasting. Some classification techniques predict with adequate accuracy, while others show a small precision. This research investigates a process called machine learning classification, which combines different classifiers to enhance the precision of weak architectures. Experimentation using this tool was conducted using a database on heart disease. The collecting and measuring data method were designed to decide how to use the ensemble methodology to improve predictive accuracy in cardiovascular disease. This paper aims not only to enhance the precision of poor different classifiers but also to apply the algorithm with a neural network to demonstrate its usefulness in predicting disease in its earliest stages. The study results show that various classification algorithmic strategies, such as support vector machines, successfully improve the forecasting ability of poor classifiers and show satisfactory success in recognizing heart attack risk. Using ML classification, a cumulative improvement in the accuracy was obtained for poor classification models. That process efficiency was further improved with the introduction of feature extraction and selection, and the findings show substantial improvements in predictive power.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"65 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131573276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Anuratha, S. Sujeetha, J. Nandhini, B. Priya, M. Paravthy
To prevent the public from pandemic Covid’19 the government of India has started the vaccination from mid of January 2021. The government has approved the two vaccines, Covishield from the university of Oxford and Covaxin from Bharat Biotech.The vaccination started with frontline workers and is further extended to common public prioritizing the elders of above 60 years and people aged 45 years above with co morbidities. Though many people have got benefitted from it there is still a group of people not convinced with the vaccination. We have carried out this work to analyze those Indian people sentiments on the vaccines through the hash tags of tweets. The results show that though majority of the community has a positive belief on the vaccines but some of them still express negative emotions.
{"title":"#Vaccine: Using Hashtags from Indian Tweets to Capture and Analyse the Sentiments of People on Vaccination for Covid’19 Pandemic","authors":"K. Anuratha, S. Sujeetha, J. Nandhini, B. Priya, M. Paravthy","doi":"10.3233/apc210183","DOIUrl":"https://doi.org/10.3233/apc210183","url":null,"abstract":"To prevent the public from pandemic Covid’19 the government of India has started the vaccination from mid of January 2021. The government has approved the two vaccines, Covishield from the university of Oxford and Covaxin from Bharat Biotech.The vaccination started with frontline workers and is further extended to common public prioritizing the elders of above 60 years and people aged 45 years above with co morbidities. Though many people have got benefitted from it there is still a group of people not convinced with the vaccination. We have carried out this work to analyze those Indian people sentiments on the vaccines through the hash tags of tweets. The results show that though majority of the community has a positive belief on the vaccines but some of them still express negative emotions.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129064954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An efficient driver assistance system is essential to avoid mishaps. The collision between the vehicles and objects before vehicle is the one of the principle reason of mishaps that outcomes in terms of diminished safety and higher monetary loss. Researchers are interminably attempting to upgrade the safety means for diminishing the mishap rates. This paper proposes an accurate and proficient technique for identifying objects in front of vehicles utilizing thermal imaging framework. For this purpose, image dataset is obtained with the help of a night vision IR camera. This strategy presents deep network based procedure for recognition of objects in thermal images. The deep network gives the model understanding of real world objects and empowers the object recognition. The real time thermal image database is utilized for the training and validation of deep network. In this work, Faster R-CNN is used to adequately identify objects in real time thermal images. This work can be an incredible help for driver assistance framework. The outcomes exhibits that the proposed work assists to boost public safety with good accuracy.
{"title":"Deep Learning Based Object Recognition in Real Time Images Using Thermal Imaging System","authors":"Rohini Goel, Avinash Sharma, Rajiv Kapoor","doi":"10.3233/apc210215","DOIUrl":"https://doi.org/10.3233/apc210215","url":null,"abstract":"An efficient driver assistance system is essential to avoid mishaps. The collision between the vehicles and objects before vehicle is the one of the principle reason of mishaps that outcomes in terms of diminished safety and higher monetary loss. Researchers are interminably attempting to upgrade the safety means for diminishing the mishap rates. This paper proposes an accurate and proficient technique for identifying objects in front of vehicles utilizing thermal imaging framework. For this purpose, image dataset is obtained with the help of a night vision IR camera. This strategy presents deep network based procedure for recognition of objects in thermal images. The deep network gives the model understanding of real world objects and empowers the object recognition. The real time thermal image database is utilized for the training and validation of deep network. In this work, Faster R-CNN is used to adequately identify objects in real time thermal images. This work can be an incredible help for driver assistance framework. The outcomes exhibits that the proposed work assists to boost public safety with good accuracy.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128128286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The main aim of this project is to propose a threat modeling framework that promotes the security of health care services. The threat model is used to analyze the cyber threats that makes the electronic health monitoring devices vulnerable to a cyber-attack. The model also helps in strengthening the security of the software-based web applications like EMR and EHR used in a health care organization. The information assets are identified and the threat agents are eliminated considering the software, web application and monitoring devices as attack surface. The major goal of this threat model is to analyze and establish the trust boundaries in the OpenEMR that render a secure data transmission. We use a STRIDE threat model and a DFD based approach using the OWASP threat modeling tool. The SIEM tools provide a continuous security methodology to document the process and result.
{"title":"Threat Model for Secure Health Care Data Using EMR, EHR and Health Monitoring Devices","authors":"Ra. Kamalaeswari, V. Ceronmani Sharmila","doi":"10.3233/apc210259","DOIUrl":"https://doi.org/10.3233/apc210259","url":null,"abstract":"The main aim of this project is to propose a threat modeling framework that promotes the security of health care services. The threat model is used to analyze the cyber threats that makes the electronic health monitoring devices vulnerable to a cyber-attack. The model also helps in strengthening the security of the software-based web applications like EMR and EHR used in a health care organization. The information assets are identified and the threat agents are eliminated considering the software, web application and monitoring devices as attack surface. The major goal of this threat model is to analyze and establish the trust boundaries in the OpenEMR that render a secure data transmission. We use a STRIDE threat model and a DFD based approach using the OWASP threat modeling tool. The SIEM tools provide a continuous security methodology to document the process and result.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128654349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}